Unit – v Network Security, Cyber Laws and Compliance Standards
Unit – v Network Security, Cyber Laws and Compliance Standards
) 14
Marks
Unit Outcomes (UOs)
5a. Explain the given authentication protocols.
5b. Explain different ways to implement IP Security
5c. Explain protocols related to Email security.
5d. Describe Public Key Infrastructure.
Working:
Kerberos operates by encrypting data with a symmetric key. A symmetric key is a
type of authentication where both the client and server agree to use a single
encryption/decryption key for sending or receiving data. When working with the
encryption key, the details are actually sent to a key distribution center, or KDC,
instead of sending the details directly between each computer. The entire
process takes a total of eight steps, as shown below:
1. The authentication server, or AS, receives the request by the client and
verifies that the client is indeed the computer it claims to be. This is usually
just a simple database lookup of the user’s ID.
2. Upon verification, a timestamp is created. This puts the current time in a user
session, along with an expiration date. The default expiration date of a
timestamp is 8 hours. The encryption key is then created. The timestamp
ensures that when 8 hours is up, the encryption key is useless. (This is used
to make sure a hacker doesn’t intercept the data, and try to crack the key.
Almost all keys are able to be cracked, but it will take a lot longer than 8 hours
to do so)
3. The key is sent back to the client in the form of a ticket-granting ticket, or
TGT. This is a simple ticket that is issued by the authentication service. It is
used for authenticating the client for future reference.
7. The service decrypts the key, and makes sure the timestamp is still valid. If it
is, the service contacts the key distribution center to receive a session that is
returned to the client.
8. The client decrypts the ticket. If the keys are still valid, communication is
initiated between client and server.
5.2 IP Security
IP Security Issues
• Eavesdropping
• Modification of packets in transit
• Identity spoofing (forged source IP addresses)
• Denial of service
IPsec aims to provide a framework of open standards for secure communications
over IP. The IP security architecture (IPsec) provides cryptographic protection for
IP datagrams in IPv4 and IPv6 network packets. IPSec (IP Security) architecture
uses two protocols to secure the traffic or data flow. These protocols are ESP
(Encapsulation Security Payload) and AH (Authentication Header). IPSec
Architecture include protocols, algorithms, DOI, and Key Management. All these
components are very important in order to provide the following main services:
• Confidentiality: by encrypting our data, nobody except the sender and
receiver will be able to read our data.
• Integrity: we want to make sure that nobody changes the data in our packets.
By calculating a hash value, the sender and receiver will be able to check if
changes have been made to the packet.
• Authentication: the sender and receiver will authenticate each other to make
sure that we are really talking with the device we intend to.
• Anti-Replay: even if a packet is encrypted and authenticated, an attacker
could try to capture these packets and send them again. By using sequence
numbers, IPsec will not transmit any duplicate packets.
Tunnel mode works only for IP-in-IP datagrams. Tunneling in tunnel mode can be
useful when computer workers at home are connecting to a central computer
location. In tunnel mode, IPsec policy is enforced on the contents of the inner IP
datagram. Different IPsec policies can be enforced for different inner IP
addresses. That is, the inner IP header, its next header, and the ports that the
next header supports, can enforce a policy. Unlike transport mode, in tunnel
mode the outer IP header does not dictate the policy of its inner IP datagram.